1 / 23

Security and Access Control using Biometrics Mike Portsmouth

Security and Access Control using Biometrics Mike Portsmouth International Association for Biometrics December 1st 2005. Introducing iAfB. The iAfB is the largest representative biometrics body in the world! Current membership is now 90+ and rising

swain
Download Presentation

Security and Access Control using Biometrics Mike Portsmouth

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security and Access Control using Biometrics Mike Portsmouth International Association for Biometrics December 1st 2005

  2. Introducing iAfB • The iAfB is the largest representative biometrics body in the world! • Current membership is now 90+ and rising • Membership spans industry, academia and government • Our services to members: • Trade Missions • Seminars/workshops • Co-operation with other Associations ie: EBF, IBIA • Promotion of best practices, etc…

  3. iAfB Activities • iAfB members are directly involved in: • Standards formulation • ISO/IEC SC/37 • BSI IST/44 • Test and evaluation • Biometrics Working Group • Major government Identification projects • UKPS/IND/IDENT1/PITO • Research and development • UK Centre of Excellence in ID Technologies

  4. Biometric Definition The automated identification, or verification of human identity through repeatable measurements of physiological and behavioural characteristics

  5. Identification: • A search of existing (enrolled) subjects: • Do I know you? • Verification: • A ‘one to one’ comparison: • Are you who you say you are?

  6. Biometric Types: • Physiological • Fingerprint • Face (2D/3D/5D) • Iris • Vein Pattern • Hand/Finger Geometry • Behavioural • Signature • Gait • Speaker Verification

  7. Some facts: • There is no one ‘killer’ Biometric • Biometrics are nearly always part of a larger system • The ‘something you are’ is very personal to the individual • It is ‘solutions’ and not ‘technologies’ that should be promoted • There is no substitute for good project management

  8. Origin of Errors False Accept Rate (FAR) The bad guy gets in! False Non-Match Rate (FNMR) The good guy is locked out!

  9. Failure to Enrol The Biometric cannot be captured, or captured well enough for the system to be able to use it. Why? There are many reasons, the majority related to the physiological (or other) characteristics of the user ‘set’.

  10. Further ‘Soft’ Issues • User Perception - Intrusiveness? • Concerns - Loss of privacy/Big Brother? • Clientele Considerations - Gender/age/disability • Difficulties - Characteristics of user population • Ease of Use - Can (will) they use it?

  11. World Drivers

  12. Present Market Spur On October 26, 2001 The law Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (the “USA Patriot Act”) was enacted. On May 14, 2002, the President signed into law H.R. 3525, the "Enhanced Border Security and Visa Entry Reform Act of 2002."

  13. Effect on the UK By Oct 2006 the UK must have introduced biometric enabled travel documents. National Institute of Standards and Technology given lead to evaluate biometric technologies. International Civil Aviation Organisation laid down standard for travel documents (9303).

  14. Market Direction • Government is providing the growth environment, but industry will be lead by popular demand. • Biometrics will become ‘ordinary’ for most users. • Contactless (RFID) smart chips are superseding original contact technology. • This combination may even become the next ‘must have’ technology.

  15. Government Government ID applications are already using advanced contactless (RFID) smart-chips and biometrics e-Passports National ID Drivers Licence US CAC and TWIC access id cards

  16. e-Passports ICAO 9303 requires a digitised facial image of the document holder to be securely attached to the travel document and suggests the use of a Radio Frequency Identification Device (ISO 14443 A/B) as the carrier. Governments MAY optionally also embed fingerprint and/or iris images.

  17. Applications • US DOD Common Access Card • - updating to multipurpose RFID/biometric ID card for data and access control • Biometric options include fingerprint, iris, hand geometry, facial recognition and voice recognition. • Unmanned buildings, doors, gates uses biometric validation between reader and card.

  18. Applications • US TWIC Transport Workers ID Card • - Utilises smartchip and biometric technologies • - Designed to improve security by standardizing credentials across all modes of transportation. The government ultimately will do background checks and other authentication of 12 million to 15 million airport, rail and port workers, and truckers who require unescorted access to secure areas.

  19. Secure Establishments Security establishments ie: Nuclear, Prisons, Petrochemical, Military, Airports, Telecomms are seeking improved security to prevent unauthorised entry or even potential terrorist activity. In access control and T&A environments, the use of a swipe, PIN or proximity card does not prove the identity of the cardholder, Biometrics do.

  20. Applications • UK Govt Dept – fingerprint + 3D face recognition for access control within buildings • HM Prisons - hand geometry for staff access • - fingerprint for visitor control • UK Detention Centre – fingerprint for visitor and inmate control

  21. Applications Ghana Telecom has completed the first stage installation of TSSI's Verid+ iClass Fingerprint Readers. The Verid+ iClass units are being used to protect telephone exchanges, equipment rooms and repeater stations - to ensure that unauthorised access is prevented. Initial installations are in the capital Accra, but a nationwide roll-out is planned. .

  22. Biometric Benefits • Protection and safety for the property • Control of facilities and assets • Improved employee accountability • Reduced costs • Increased profitability

  23. Questions www.iafb.org.uk

More Related